Security and encryption optical systems based on a correlator with significant output images.

  title={Security and encryption optical systems based on a correlator with significant output images.},
  author={Youzhi Li and Kathi Kreske and Joseph Rosen},
  journal={Applied optics},
  volume={39 29},
An improved optical security system based on two phase-only computer-generated masks is proposed. The two transparencies are placed together in a 4f correlator so that a known output image is received. In addition to simple verification, our security system is capable of identifying the type of input mask according to the corresponding output image it generates. The two phase masks are designed with an iterative optimization algorithm with constraints in the input and the output domains. A… CONTINUE READING
Highly Cited
This paper has 62 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-10 of 32 extracted citations

Computer-generated hologram authentication via optical correlation

2016 IEEE 14th International Conference on Industrial Informatics (INDIN) • 2016

Enhancing security of images by Steganography and Cryptography techniques

2016 Sixth International Conference on Innovative Computing Technology (INTECH) • 2016
View 1 Excerpt

Generalized iterative phase retrieval algorithms and their applications

2015 IEEE 13th International Conference on Industrial Informatics (INDIN) • 2015
View 2 Excerpts

62 Citations

Citations per Year
Semantic Scholar estimates that this publication has 62 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 10 references

Towghi, “Noise performance of double-phase encryption compared to XOR encryption,

B. Javidi, L. Bernard
Opt. Eng • 1999

Ahouzi, “Optical security system with Fourier plane encoding,

E. B. Javidi
Appl. Opt • 1998

Experimental demonstration of the random phase encoding technique for image encryption and security verification,

B. Javidi, G. S. Zhang, J. Li
Opt. Eng • 1996

Random phase encoding for optical security,

R. K. Wang, I. A. Watson, C. Chatwin
Opt. Eng • 1996

Noise performance of doublephase encryption compared to XOR encryption

L. Bernard B. Javidi, N. Towghi
Opt . Lett . • 1995

Optical pattern recognition for validation and security verification,

B. Javidi, J. L. Horner
Opt. Eng • 1994

Iterative approaches to computer-generated holography,

B. K. Jennison, J. P. Allebach, D. W. Sweeney
Opt. Eng • 1989

Similar Papers

Loading similar papers…